enabled applications marketing guide q1 2015 · 2015-10-05 · enabled applications marketing guide...
TRANSCRIPT
5th Generation Intel® Core™ vPro™ ProcessorsEnabled Applications Marketing Guide
Q1 2015
Intel Confidential • For Use Under NDA Only • Do Not Forward
Legal Notices and Disclaimers
10/5/2015 2
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
All products, computer systems, dates and figures specified are preliminary based on current expectations, and are subject to change without notice.
All products, platforms, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. All dates specified are target dates, are provided for planning purposes only and are subject to change.
This document contains information on products in the design phase of development. Do not finalize a design with this information. Revised information will be published when the product is available. Verify with your local sales office that you have the latest datasheet before finalizing a design.
Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user.
Intel, Intel Inside, Intel Atom, vPro and Intel Core are trademarks of Intel Corporation in the U.S. and other countries.
Other names and brands may be claimed as the property of others.
Copyright © 2015, Intel Corporation. All rights reserved.
Intel Confidential • For Use Under NDA Only • Do Not Forward
Added 5th generation processor Production Wins
Updated descriptions of all 4th generation processor applications
Added Microsoft SCCM information
Updated product links
Contacts identified for all apps
Included all previous Manageability applications
What’s New in this Update
10/5/2015 3
Contents
Intel Core vPro technology
Security and Data Protection solutions
Management solutions
Compute Model Flexibility solutions
10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 4
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Platform
10/5/2015 5
Use
rIT
Intel® Active Management Technology
(AMT)
Intel® SSD Pro SeriesData Protection
Intel® Trusted Execution Technology (TXT)and Virtualization Technology (VT)
Network
Intel® LAN/WLAN controller
Chipset
Intel® Express Chipset
Processor
Intel® Core™ processors
Intel® HD and Iris GraphicsIntel® Pro
Wireless DisplayIntel® Wireless Gigabit
Docking
High-performingIntel® Core™ vPro™
processor based devices
Intel® vPro™ Platform is the sum of hardware, BIOS extensions and applications that deliver solutions for businesses
Intel Confidential • For Use Under NDA Only • Do Not Forward
5th Generation Intel® Core™ vPro™ and Intel® Core™ M vPro™ Platform
10/5/2015 6
No Wires
Secure
Intel® Core™ vPro™ Processors• High performance processor, enhanced battery life1
• 2 in 1 convertibles, Ultrabook™, thin clamshells
Intel® Core™ M vPro™ Processors• Balanced processor performance, battery life2
• Tablets, 2 in 1 detachables, ultra-thin clamshells
Intel® Pro Wireless Display• Presentation controls and privacy
• Enhanced security and network protection3
Intel® Wireless Gigabit Docking• Convenient and quick docking
• Secure connection with remote management
Intel® Active Management Technology• Remote KVM control over wireless networks
Intel® Setup and Configuration Service• New configuration and fine-tune controls
Delivering new productivity experiences for the business user
New data protection. Enhanced authentication.
Innovative 14nm designs, setting new standard for business PCs
Intel® SSD Pro 2500 Series• Data productivity with automatic drive encryption• Supports new OPAL 2.0 usages
Enhanced Identity Protection (IPT)• Simplifying authentication; hardware-strength enhancements
Manageable
Stylish & Robust
Leading-edge security for an unwired workplace
Mobile manageability made easier
1 4th gen Intel® Core™ vPro™ (Y-Series) vs Intel® Core™ M vPro™ processor2 4th gen Intel® Core™ vPro™ (U-Series) vs 5th gen Intel® Core™ vPro™ (U-Series) processor3 Intel® Wireless Display v5.1 vs Intel® Pro Wireless Display v5.1
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel vPro Technology Value Proposition
10/5/2015 7
Intel® Core™ M vPro™ and 5th generation Intel® Core™ vPro™ platforms
vPro: the systems workers want to get their hands on, so secure/manageable IT won't have to...
Increase organizational efficiency, and enhance security while providing workers with flexible tools to be most productive
• Intel® SSD Pro 2500 with OPAL 2.0 support• Intel® Active Management Technology with Microsoft* InstantGo support
Enhance collaboration and increase worker productivity by removing burdens of wires, dongles and passwords
• No Wires: Intel Pro WiDi 5.1 and Intel® Wireless Gigabit Docking• No Password: Intel® Identity Protection Technology• Built-In Visuals: Stunning processor graphics for business applications
IT End-user
New Capabilities for IT & End Users
Intel® Identity Protection Technology
No Passwords
Intel® SSD Pro 2500
Data Security No Wires
Intel® Pro WiDi 5.1Intel® Wireless Gigabit Docking
Intel® HD Graphics
Built-In Visuals
Intel Confidential • For Use Under NDA Only • Do Not Forward
Delivering the Best Experience with Intel® vPro™ Technology
10/5/2015 8
Security & Data Protection
Intel® SSD Pro 2500 Series Intel® SSD Pro 2500 Series (OPAL 2.0 usage)
Manageability
Intel® Active Management Technology
Intel® Setup and Configuration SWMeshCentral (Open Source SW)
Compute Model Flexibility
Intel® GVT VMCS ShadowingIntel® Trusted Execution Technology
Intel® Identify Protection Technology
Identity Protection Data EncryptionSecure Managed
ContainersIntel® Digital Fence
Remote, Out-of-Band Discover, Manage, Configure Graphics Virtualization Secure Client Virtualization
Enterprise Data Security
Intel® SSD Pro 2500 Series (OPAL 2.0 usage)
BDW-NI/AES-NI/TSX-NIIntel® Secure Key Technology
Additional software and non-client hardware may be required for solution implementation.See capability readiness and availability indicators to reference when certain capabilities/usages are available and current maturity stage.All capabilities, targets and availability is subject to change without notice
Productivity & Collaboration
Intel® Pro WiDi 5.1 Intel® Wireless Gigabit Industry-specific usages Intel® HD Graphics Microsoft* InstantGo SupportIntel® Smart Connect TechnologyIntel® Ready Mode Technology
Wireless Display Wireless Docking Location Based Services Business GraphicsAlways Fresh Data and
Responsiveness
Intel Confidential • For Use Under NDA Only • Do Not Forward
Enabled Partner Applications Portfolio
10/5/2015 9
Security and Data Protection
Absolute Software Computrace
Absolute Software LoJack
Absolute Software Data Protect
Charismathics CSSI
Cisco AnyConnect
HID ActivClient
McAfee Intel Management Technologies
McAfee Data Protection
McAfee Risk & Compliance
Microsoft Bitlocker Drive Encryption
OpenSSL SSL Library
RSA BSAFE
RSA SecurID Software Tokens
Symantec Endpoint Encryption
Symantec Managed PKI
WinMagic SecureDoc
WolfSSL SSL Library
Manageability
Accenture ARROW
AeroScout MobileView
Atos Remote PC Management
AVG Managed Workplace
Bomgar Bomgar
Compucom EUC WorkBench
Continuum Platform Remote Monitoring and Management
Dell Kace K1000 Management Console
GeneralSoft Desktop Terminal Management
Kaseya Virtual System Administrator
LabTech Remote Monitoring and Management
LANDesk Management Suite
McAfee ePO Deep Command
Microsoft System Center Configuration Manager
N-able N-central
RealVNC VNC Viewer Plus
Spiceworks Spiceworks IT
Symantec Client Management Suite
Virtualization
Bromium vSentry
Citrix XenClient Enterprise
36pt Intel Clear Section Break Page Example
10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 10
Security and Data Protection
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel vPro Technology Features: Mapping to IT Security Pillars
10/5/2015 11
Malware Resiliency Identity Data Protection
Threats find nowhere to run or hide
• Intel® Trusted Execution Technology
• Intel® Platform Protection Technology with AES-NI
• Intel® Data Protection Technology with Secure Key
Always updated robust systems
• Intel® Platform Protection Technology with BIOS Guard (PFAT)
• McAfee* ePolicy Orchestrator/ Deep Command/Risk Advisor
Simple access with hardware-strength security
• No Password VPN using IPT with PKI
• Hardware-strength identity protection using IPT with MFA
Data safe from theft or alteration
• Intel® SSD Pro series
• Intel® Digital Fence solution and secure containers available on Intel SSD Pro series drives
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
Absolute Computrace provides a robust, multi-layered security solution to enable organizations to address issues of regulatory compliance, data protection, computer theft recovery, and asset tracking. Computrace supports Intel® Anti-theft Technology to lock lost stolen laptops.
Benefits When Used with Intel® vPro™ Technology
Detect and respond to theft even when the PC is offline.
Delete software-based encryption keys, prevent the PC from booting, or both.
Rapidly reactivate a system through a local passphrase or a remotely generated unlock token.
Allows robust policies to be pushed to device for local enforcement
Absolute Computrace
10/5/2015 12
SHOWCASES:
• Pro SSD
Link:
Contact: Shari Hamlin
4th generation
Computrace
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionAbsolute Software LoJack
10/5/2015 13
SHOWCASES:
• Pro SSD
Link:
Contact: Shari Hamlin
4th generation
LoJack
Absolute LoJack theft recovery solutions will aid in the recovery of a stolen laptop, smartphone or tablet and return to its owner. Locate a device, lock it against unauthorized users and permanently erase files, all from a remote location. Even if thieves reset the device to factory settings or wipe the hard drive, patented Absolute persistence technology re-installs the software despite their best efforts. User identity and data are protected.
Benefits When Used with Intel® vPro™ Technology
Detect and respond to theft even when the PC is offline.
Delete software-based encryption keys, prevent the PC from booting, or both.
Rapidly reactivate a system through a local passphrase or a remotely generated unlock token.
Allows robust policies to be pushed to device for local enforcement
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionAbsolute Software Data Protect
10/5/2015 14
SHOWCASES:
• Pro SSD
Link:
Contact: Shari Hamlin
4th generation
Data Protect
Installing Absolute Data Protect on a laptop, tablet or smartphone lets it be located, locked from unauthorized use and sensitive data permanently erased all from a remote location. Important files, saved passwords and personal information are secure and user identity safe.
Benefits When Used with Intel® vPro™ Technology
Locate lost devices using Wi-Fi, GPS or IP geolocation
Device lock to prevent unauthorized access on laptops
Permanently erase files with personal information
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionCharismathics Smart Security Interface (CSSI)
10/5/2015 15
SHOWCASES:
• IPT-PKI
Link:
Contact: Paul Carbin
5th generation
CSSI
The Charismathics smart security interface© is a fully configurable PKI client that implements the cryptographic functions implemented in Intel® IPT with PKI. It also supports most smart phones, and all TPM platforms and thumb drives worldwide. It allows creating data structures for literally any application or specification. It is used for certified digital signatures. It is independent of hardware and PC client software.
Benefits When Used with Intel® vPro™ Technology
Instead of handling additional hardware and software, such as smart cards, readers, drivers, printers and messing around with requirements from many different groups of your organization, you will now issue your certificates right into the heart of the Intel Core, and serve all authentication and encryption demands that you need to support.
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
Cisco AnyConnect is a unified agent that delivers multiple security services to help enable and protect the enterprise. It provides the visibility and the control to identify who and what is accessing the extended enterprise before, during, and after an attack. The Cisco AnyConnect Secure Mobility Solution offers a comprehensive endpoint security platform with remote access functionality, posture enforcement, and web security features.
Benefits When Used with Intel® vPro™ Technology
Enable mobile users to easily and securely access the network with any mobile device.
Easily manage the security risks of borderless networks.
Optimized for Identity Protection with PKI
Cisco AnyConnect
10/5/2015 16
SHOWCASES:
• IPT-PKI
Link:
Contact: Andy Weidner
5th generation
AnyConnect
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
ActivClient allows organizations to deploy the best strong authentication solution for their environment. Choosing from a range of credential options, including smart cards and USB tokens. The strong authentication solution is also available for all major mobile platforms, enabling organizations to protect their resources whether accessed from a desktop, laptop, tablet or smartphone.
Benefits When Used with Intel® vPro™ Technology
Increase security: ActivClient offers a user-friendly strong authentication experience.
Improve compliance: Complies with all major government and industry regulations.
Optimize productivity: Single, versatile strong authentication tool for both Windows Login and Remote Access
Reduce costs: Integrates easily into existing infrastructure
HID ActivClient
10/5/2015 17
SHOWCASES:
• NFC with tap-to-login to Windows
Link:
Contact: Naveen Doddapuneni
5th generation
ActivClient
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
McAfee ePolicy Orchestrator (ePO) Deep Command enables remote assistance and remediation with ePO-class scalability. McAfee Endpoint Encryption provides full disk encryption utilizing Intel® AES-NI to protect data from unauthorized access, loss, and exposure with integrated unique out-of-band centralized management.
Benefits When Used with Intel® vPro™ Technology
Unlock PCs, reset passwords, and perform remediation remotely.
Protect client PCs even when powered off—saving energy.
Effectively manage thousands of endpoints with Intel® AMT technology.
Gain immediate access to endpoints even when network access is compromised.
McAfee ePolicy Orchestrator Deep Command
10/5/2015 18
SHOWCASES:
• AES-NI
Link:
Contact: Naveen Doddapuneni
5th generation
ePO DeepCommand
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionMcAfee Data Protection
10/5/2015 19
SHOWCASES:
• AES-NI
Link:
Contact:
5th generation
Data Protection
Safeguard critical data and help ensure regulatory compliance with McAfee Data Protection solutions. Encryption options include enterprise-grade drive encryption or management of native encryption. Available individually or in suites, McAfee Complete Data Protection Suites and McAfee Data Loss Prevention solutions provide multilayered protection for your data regardless of where it resides — on the network, in the cloud, or at the endpoint.
Benefits When Used with Intel® vPro™ Technology
Delivers Near Native Performance : Highly optimized use of Intel’s AES-NI makes encryption transparent to end user
Extends the Reach of IT : Integrate with Intel’s vPro™ AMT to allow IT to reach/encrypt/manage systems anywhere
Makes Security Seamless : Leverage TPM hardware to provide another secure option for pre-boot authentication
Helps Prevent Cold Boot Attacks : Seamlessly move encryption keys from insecure RAM to secure Intel hardware in Connected Standby
Accelerates Storage Performance and Lower TCO : Support for Intel® SSD Professional Family (instant Opal activation, HW-based encryption, zero performance impact)
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionMcAfee Total Protection for Compliance
10/5/2015 20
SHOWCASES:
• xxx
Link:
Contact: Naveen Doddapuneni
5th generation
Total Protection
McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits from weeks to days. McAfee® Total Protection for Compliance combines the power of McAfee Vulnerability Manager and McAfee Policy Auditor, and integrates them with McAfee® ePolicy Orchestrator (McAfee ePO™) to create a single platform for deployment, management, risk analysis, and compliance reporting.
Benefits When Used with Intel® vPro™ Technology
Simplifies compliance coverage through unified IT policy auditing
Delivers the most effective technology approach by supporting both agent and agentless scans
Automates time-consuming audit tasks by consolidating network and host-based assessments
Enhances and optimizes existing investments in security management infrastructure
Increases the value of security protection through McAfee’s advanced countermeasure aware risk management technology
Reduces audit preparation time by supporting automated industry standards content
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
BitLocker Drive Encryption* enhances data protection by bringing together two major sub-functions: drive encryption and integrity checking of early boot components.
Benefits When Used with Intel® vPro™ Technology
Accelerate AES-NI encryption operations.
Prevent unauthorized users from accessing files, including swap and hibernation files.
Perform integrity checking on early boot components for increased security before data decryption.
Microsoft BitLocker Drive Encryption
10/5/2015 21
SHOWCASES:
• AES-NI
Link:
Contact: Shari Hamlin
5th generation
BitLocker
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, open source toolkit implementing the Secure Sockets Layer and Transport Layer Security protocols as well as a full-strength general purpose cryptography library.
Benefits When Used with Intel® vPro™ Technology
Support multiple cryptographic algorithms, including AES-NI as Intel® Secure Key.
Open SSL Library
10/5/2015 22
SHOWCASES:
• AES-NI
Link:
Contact: Shari Hamlin
5th generation
OpenSSL
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionRSA BSAFE
10/5/2015 23
SHOWCASES:
• AES-NI
• BDW-NI
• Secure-Key
Link:
Contact: Shari Hamlin
5th generation
BSAFE
RSA BSAFE security software products enable developers to meet the wide-ranging security goals of their applications. BSAFE software is available in C/C++ and Java. It combines core security functionality into one common, interoperable, and flexible set of libraries.
RSA BSAFE Crypto Kernel offers versions of popular cryptographic algorithms optimized for both small code size and high performance. Unlike alternatives such as open source, our technology is backed by highly regarded cryptographic experts.
Benefits When Used with Intel® vPro™ Technology
Crypto Kernel supports the most commonly used ciphers, digests and algorithms.
Algorithms are optimized for high performance and small code size
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionRSA SecurID Software Tokens
10/5/2015 24
SHOWCASES:
• IPT-PKI
Link:
Contact: Shari Hamlin
5th generation
SecureID
SecurID Software Tokens reduce the number of items a user has to manage for safe and secure access to corporate assets. It can streamline the workflow for distributing and managing two-factor authentication for a global workforce. Companies can revoke and recover software tokens when someone leaves the company or loses a device, eliminating the need to replace tokens.
Benefits When Used with Intel® vPro™ Technology
Strong two-factor authentication to protected network resources
Software token automation for integration with available RSA SecurID Partner applications
Silent installation and silent upgrade
Multiple token provisioning options including Dynamic Seed Provisioning (CT-KIP)
Web plug-in for fast access to protected web sites with Microsoft Internet Explorer
Interoperability with Windows screen readers for visually impaired users
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
Symantec Endpoint Encryption combines strong full-disk and removable media encryption with an intuitive central management platform to protect sensitive data from loss or theft and help administrators prove a device was encrypted should it go missing.
Benefits When Used with Intel® vPro™ Technology
Maximize encryption speed with Intel® Advanced Encryption Standard Instructions (AES-NI) support.
Symantec Endpoint Encryption
10/5/2015 25
SHOWCASES:
• IPT-PKI
Link:
Contact: Paul Carbin
5th generation
Endpoint
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
Symantec Managed PKI Service is a trusted cloud-based service that secures mission-critical interactions. Built on Symantec’s proven, globally managed, highly reliable infrastructure, Symantec Managed PKI Service enables organizations to issue, renew, and revoke digital certificates which can be used for strong authentication, encryption, and digital signing applications.
Benefits When Used with Intel® vPro™ Technology
Utilizes Intel® Identity Protection Technology with Public Key Infrastructure (PKI) support.
Symantec Managed PKI
10/5/2015 26
SHOWCASES:
• IPT-PKI
Link:
Contact: Paul Carbin
5th generation
Managed PKI
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data Protection
WinMagic SecureDoc offers hybrid Full Disk Encryption for client-server architecture. SecureDoc* also supports Intel® Anti-Theft Technology to provide additional layer of security to protect laptop and data.
Benefits When Used with Intel® vPro™ Technology
Removable Media Encryption
Manage hard drive encryption through a heterogeneous management console
Manage encrypted SSDs and Seagate and Opal hard drives
Disable access to encrypted data and laptop by locking a lost/stolen laptop using Anti-Theft Technology
Protect encrypted data in S3 sleep state
WinMagic SecureDoc
10/5/2015 27
SHOWCASES:
• Pro SSD
Link:
Contact: Shari Hamlin
4th generation
SecureDoc
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Security and Data ProtectionwolfSSL
10/5/2015 28
SHOWCASES:
• AES-NI
Link:
Contact: Shari Hamlin
5th generation
wolfSSL
wolfSSL is a low resource C-language-based SSL/TLS library targeted for environments from IoT devices to the Cloud because of its speed and portability. As a low power consumer wolfSSL is perfect for server farms as well. wolfSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, offers a simple API, FIPS, an OpenSSL compatibility layer, OCSP, and offers several progressive ciphers.
Benefits When Used with Intel® vPro™ Technology
First TLS provider to fully utilize vPro(tm) Technology
Hyper optimized allowing superior scalability
Fastest crypto solution from AES to SHA2 to public key operations
wolfSSL
36pt Intel Clear Section Break Page Example
10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 29
Manageability
Intel Confidential • For Use Under NDA Only • Do Not Forward
Manageability: Greater Control Regardless of Device Type or Device State
10/5/2015 30
2-in-1
All-In-One PCs
Ultrabook™
Discover, manage and configure devices remotely while minimizing end-user downtime
Remote, out-of-band manageability allows IT to save time and money on disk reimaging
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
ManageabilityAccenture ARROW
10/5/2015 31
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
Link:
Contact: Dena Lumbang
4th generation
ARROW
Accenture Remote Resolution Online Workforce (ARROW) is a global service that packages a team of skilled resources, great Intel technology, workflow tools and automation to deliver an elevated level of end user support to enterprises. Hardware-based KVM remote control enable remote diagnostics and repair. A remote “poison pill” can be sent to a lost device rendering it inoperable. A stolen PC’s hard drive remains encrypted and locked from thieves.
Benefits When Used with Intel® vPro™ Technology
Significantly decreases help desk response time
Delivers an average 30-40% better agent productivity
Automation starts immediately after connection
• Intel® SCS
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
AeroScout products combine real-time location, auto-identification, wireless sensing and telemetry technologies to automate business processes and deliver context-aware applications. Real-Time Visibility solutions from AeroScout go beyond standalone RFID, RTLS and sensor solutions by unifying all enterprise visibility data on a single Wi-Fi-based platform.
Benefits When Used with Intel® vPro™ Technology
Now Intel and AeroScout have joined forces to deliver seamless Wi-Fi based indoor location services on Intel-based devices. Powered by AeroScout Wi-Fi tags integrated directly into devices, the Intel® vPro Technology, Location-Based Service uses existing Wi-Fi enterprise infrastructures to help locate people and assets.
AeroScout MobileView
10/5/2015 32
SHOWCASES:
• Wi-Fi HW
• Location based services
Link:
Contact: Andy Weidner
4th generation
MobileViiew
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
As a service provider, Atos uses Intel vPro technology features to reduce the number of Desk-side visits traditionally required to manage and maintain systems at customer sites, minimizing business interruptions for its customers while lowering the customer’s total cost of ownership.
Benefits When Used with Intel® vPro™ Technology
Atos estimated improvements:
reduce time to discover and provision new PCs by 35 percent
Reduce manual inventories by 95 percent
Eliminate manual BIOS updates
Reduce time to update firmware by 85 percent
Atos Remote PC Management
10/5/2015 33
Link:
Contact: Trevor Lawless (SMG)
White Paper
5th generation
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
• Intel® SCS
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
An award-winning remote monitoring and management software application for technology providers servicing small and mid-sized customers. Leverages the capabilities of Intel vPro technology to provide comprehensive remote monitoring and management.
Benefits When Used with Intel® vPro™ Technology
Reduce desk-side and service depot visits by resolving problems quickly from the management console — even if a PC is powered off or in standby mode, is connected to a wireless network, or has an unresponsive operating system.
Automated proactive alerts identify issues before they escalate into problems or require costly repairs.
Secure remote power-up and power cycling allow scheduled maintenance, backups and monitoring to be performed after hours, avoiding interruptions to business.
Remote POST and BIOS access improves ability to remotely debug issues.
Encrypted, remote security updates help ensure that security patches are up to date and speed the deployment of critical patches, even to systems that are off or down.
Remote asset-tracking eliminates time-consuming manual inventory of hardware and software and is possible even if a system is off or down.
AVG Managed Workplace (formerly Level Platforms)
10/5/2015 34
Link:
Contact: Dena Lumbang
Managed Workplace
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
4th generation
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
Bomgar enables IT to support all of their systems over the web, through its secure appliance tool. Because all supported platforms are included in the core product, IT can resolve issues spanning multiple systems without creating multiple audit trails. Supporting everything with one solution speeds incident handling time and support rep productivity.
Benefits When Used with Intel® vPro™ Technology
Troubleshoot PCs with or without user participation
Reboot system to clean state, or redirect boot device
Watch BIOS, drivers, and OS attempt to load to identify problems with the boot process
Rebuild OS, fully reimage hard drive, or edit BIOS settings remotely
Perform OS migrations and application upgrades remotely
Bomgar
10/5/2015 35
Link:
Contact: Dena Lumbang
5th generation
Bomgar
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
• Intel® SCS
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
CompuCom’s EUC Workbench™ is a combination of tools that allows any support-related personnel, such as service desk agents and network administrators, to take hardware control of a remote client— and perform a variety of hardware and software diagnostics and repair without a physical desk side support visit.
Benefits When Used with Intel® vPro™ Technology
Remote diagnostic and repair: Resolve PC problems from console managed by CompuCom’s Service Desk, even if the PC is powered off, in standby, (NOT) connected to WiFi, or has a disabled OS
Automated alerts: Identify issues in advance, such as disabled software, hard drive health, and memory usage
Secure remote power up and power cycling: Perform scheduled maintenance, backups, and monitoring
Encrypted, remote security updates and remote access tracking: Even if systems are off or down
Compucom EUC WorkBenchTM
10/5/2015 36
Link:
Contact: Dena Lumbang
4th generation
EUC WorkBench
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
• Audit Log
• Alarm Clock
• Intel® SCS
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
ManageabilityContinuum Platform Remote Monitoring and Management
10/5/2015 37
SHOWCASES:
• Intel® SCS
Link:
Contact: Dena Lumbang
5th generation
RMM
Continuum RMM is delivered via a SaaS-based management portal, and dramatically increases operational efficiency – allowing users to easily monitor, troubleshoot, and maintain desktops, servers, mobile devices and other endpoints for clients. The platform also includes alerting, integrated ticketing, automated recommendations, remote control, scripting, patch management, antivirus software, and reporting.
Benefits When Used with Intel® vPro™ Technology
Discovery: Identify the platform capabilities and the state of Intel® Active Management Technology
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
The Dell KACE Family of Systems Management Solutions provides comprehensive management for servers, PCs, Macs, Chromebooks, smartphones, tablets, printers, networking gear and other connected non-computing devices. Our solutions are affordable and easy to deploy and use. In addition, they can fulfill the systems management needs of organizations of all sizes, from initial computer deployment to ongoing management and retirement.
Benefits When Used with Intel® vPro™ Technology
Discovery: Identify the platform capabilities and the state of Intel® Active Management Technology
Dell/Kace K1000 Management Console
10/5/2015 38
SHOWCASES:
• Intel® SCS
Link:
Contact: Dena Lumbang
4th generation
Kace Management
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
GeneralSoft Terminal Management gives IT administrators powerful tools for managing end clients, applications, and computer networks. It can remotely determine software and hardware information, monitor computer state, prevent virus invasion, malicious scanning and support remote diagnosis for everyday maintenance.
Benefits When Used with Intel® vPro™ Technology
Manage clients regardless of system state and location inside or outside of the corporate network.
Better access clients and troubleshoot user problems with enhanced remote control and diagnosis.
Receive alerts about abnormal events, such as agent removal or malicious attack.
GeneralSoft Desktop Terminal Management
10/5/2015 39
SHOWCASES:
• Intel® SCS
Link:
Contact: Templor Du
5th generation
Terminal Management
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
Kaseya VSA is a comprehensive IT management solution that offers MSPs and IT departments the most powerful tool on the market for centrally managing and automating all of IT.
Benefits When Used with Intel® vPro™ Technology
Remotely remediate blue screen, network adapter failure, OS corruption and other problems.
Remotely power up, power down, and reset PCs.
Shift software updates, patch management, and more to off-hours when they won’t interfere with customer productivity.
Kaseya Virtual System Administrator (VSA)
10/5/2015 40
Link:
Contact: Dena Lumbang
5th generation
VSA
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Intel® SCS
• Win 8.1 (MDM)
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
LabTech improves an IT solution provider’s service offering through remote support that results in improved technician efficiency, added flexibility and dramatic cost reduction while driving IT automation into your business. With its latest features and enhancements, LabTech delivers increased speed, real-time agent deployment status and unprecedented centralized visibility into customers’ systems.
Benefits When Used with Intel® vPro™ Technology
For an OS issue: Intel® vPro™ technology has a remote control KVM that is supported natively gives the ability to work on the machine at the BIOS level, which speeds the repair of multiple types of problems and saves the cost of truck rolls to diagnose & repair the problem.
For a hardware issue: Diagnose the issue remotely and send a technician out once with the right part, instead of twice.
LabTech Remote Monitoring and Management
10/5/2015 41
Link:
Contact: Dena Lumbang
5th generation
RMM
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Intel® SCS
• Graceful
Shutdown
• Win 8.1 (MDM)
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
LANDESK® Management Suite increases user and IT productivity. It helps IT administrators automate software and OS deployments, fix user issues quickly, and track software assets. This flagship solution positions LANDESK as a leader in Gartner’s Magic Quadrant for Client Management Tools.
Benefits When Used with Intel® vPro™ Technology
Authenticate and broker out-of-band communications with clients outside the corporate network
Troubleshoot user problems regardless of system and OS state with pre-boot remote control and agent-based video redirection
Push patches to PCs that have been shut down for faster patch saturation, greater worker productivity, and reduced energy bills
LANDESK Management Suite
10/5/2015 42
Link:
Contact: Dena Lumbang
4th generation
Client Management Suite
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
• Graceful
Shutdown
• Host Based
• Configuration
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
McAfee ePO Deep Command software paired with Intel® AMT helps manage security administrators lower costs by streamlining endpoint management. With the ability to remotely manage PC’s when issues arise like security incidents and forgotten encryption passwords, the need for desk-side visits is reduced.
Benefits When Used with Intel® vPro™ Technology
Set a power schedule for a group of devices and track the power savings of the schedule
Securely wake PCs after hours so that systems can be kept up to date without interrupting users
Remotely diagnose and repair PCs
McAfee ePO Deep Command
10/5/2015Intel Confidential 43
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
Link:
Contact: Lance Atencio
5th generation
ePO Deep Command
• Intel® SCS
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
Out of band management allows an administrator to connect to a computer's management controller when the computer is turned off, in sleep or hibernate modes, or otherwise unresponsive through the operating system. By way of contrast, in-band management is the classic approach used by Configuration Manager and its predecessors whereby an agent runs in the full operating system on the managed computer and the management controller accomplishes tasks by communicating with the management agent.
Benefits When Used with Intel® vPro™ Technology
Powering on one or many computers
Powering off one or many computers
Restarting a nonfunctioning computer or booting from a locally connected device or known good boot image file.
Re-imaging a computer by booting from a boot image file that is located on the network or by using a PXE server.
Reconfiguring the BIOS settings on a selected computer
Booting to a command-based operating system to run commands, repair utilities, or diagnostic applications (for example, upgrading the firmware or running a disk repair utility).
Configuring scheduled software update deployments and advertisements to wake up computers prior to running.
Microsoft System Center Configuration Manager
10/5/2015 44
SHOWCASES:
• Remote Power On
• KVM¹
• IDE-R
• Serial Over LAN
Link:
Contact: Lisa Watts
5th generation
Quick Start Guide
¹MS SCCM plug-in required²Intel® SCS plug-in for MS SCCM required
• Audit Log
• Intel® SCS²
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
A comprehensive remote PC and network management platform based on Intel vPro technology. Transforms your business so you can gain the managed services provider benefits of recurring revenue, increased business valuation and higher technician utilization rates.
Benefits When Used with Intel® vPro™ Technology
Manage multiple networks and sites from a single interface
Monitor every desktop, server and network device
Control any device anytime, anywhere
Generate reports to speed up troubleshooting & demonstrate value
Protect all network endpoints with enterprise-class security
Automate more tasks with automated self-healing
Provide proactive patch management across one or many distributed networks
Protect data with fast, simple, reliable backup and recovery
N-able N-central
10/5/2015 45
SHOWCASES:
• Remote Power On
• IDE-R
• Serial Over LAN
Link:
Contact: Dena Lumbang
N-Able RMM
4th generation
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
VNC Viewer Plus allows users to connect to PCs with Intel® Core™ vPro™ processor family remotely, even when out of band. When connecting to a VNC server in-band, users can perform file transfers, remote printing, chat, and more.
Benefits When Used with Intel® vPro™ Technology
Able to connect even if the computer is powered off , or has no functioning operating system
Diagnose complex issues, such as OS failures and boot problems, remotely
Remotely perform a hardware reset
Protect PCs from connection snooping, man-in-the-middle attacks, and packet-tampering attacks
Reboot from a remote CD or image
RealVNC VNC Viewer Plus
10/5/2015 46
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
Link:
Contact: Amit Tarberg
4th generation
VNC Viewer Plus
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
Spiceworks is network management software and help desk software designed for networks with up to 1,000 devices. It combines help desk software, network inventory, network monitoring, IT reporting, and network configuration management. Spiceworks enables the user to quickly and conveniently inventory the hardware, software, and patches that reside on the network.
Benefits When Used with Intel® vPro™ Technology
Set a power schedule for a group of devices and track the power savings of the schedule
Securely wake PCs after hours so that systems can be kept up to date without interrupting users
Remotely diagnose and repair PCs
Spiceworks IT
10/5/2015 47
Link:
Contact: Dena Lumbang
5th generation
Spiceworks IT
SHOWCASES:
• Remote Power On
• KVM
• IDE-R
• Serial Over LAN
• Intel® SCS
• Win 8.1 (MDM)
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Manageability
Symantec Client Management Suite powered by Altiris enables administrators to deploy, manage, and troubleshoot systems from virtually anywhere, virtually anytime. It enables remote patch control (in any OS state), software delivery, application management, and problem diagnostics and resolution.
Benefits When Used with Intel® vPro™ Technology
Perform secure out-of-band management in any power or OS state on wired and wireless platforms
Take hardware inventory from any power or OS state
Control power from any power state
Perform IDE redirection to boot non-native drives for diagnostics and repair
Perform remote diagnostics/repair and BIOS management via monitor and keyboard redirection
Symantec Client Management Suite
10/5/2015 48
SHOWCASES:
• Remote Power On
• KVM
• Intel® SCS
Link:
Contact: Johanna Holopein
5th generation
Client Management Suite
36pt Intel Clear Section Break Page Example
10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 49
Compute Model Flexibility
Secure Client Virtualization
Protect virtual and physical environment from malware and rootkits
Validate the behaviors of key components of client system at startup to prevent attacks
Establish HW based root of trust for measured launch environment
Hardening the hypervisor with Citrix XenClient* XT
Intel Confidential • For Use Under NDA Only • Do Not Forward 50
Intel® Trusted Execution Technology (TXT)
10/5/2015
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® GVT: A High Performance Graphics Virtualization Solution on Intel® Processor Graphics
10/5/2015 51
Example GPU Accelerated Tasks
Video Playback/Edit
Web Experience
Office Productivity
User Interface
Computer Aided Design
Weather Broadcast
Use Cases
Virtual Data Center
Cloud
Remote Virtual Desktop
Rich Virtual Client
Bring Your Own Device
Multi-Screen Infotainment
Secure e-Payment
VM
VM
VM
App
App
App
Hyp
erv
iso
r
3D Graphics
Media
Compute
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Virtualization
vSentry is built on the Bromium MicrovisorTM – a small, security-focused hypervisor powered by the Xen hypervisor that automatically and invisibly hardware-isolates each untrustworthy task – one that is processing data or executing code from an untrustworthy source –in a micro-VM that cannot modify Windows or gain access to enterprise data or networks. vSentry protects enterprise desktops that haven’t been patched and eliminates costly remediation by automatically discarding malware.
Benefits When Used with Intel® vPro™ Technology
Improved virtual machine performance taking advantage of Intel® Virtualization Technology and acceleration of nested hypervisors with Intel® VMCS Shadowing.
Bromium vSentry
10/5/2015 52
SHOWCASES:
• Intel GVT
• VMCS Shadowing
Link:
Contact: Dena Lumbang
5th generation
vSentry
Intel Confidential • For Use Under NDA Only • Do Not Forward
Intel® vPro™ Application Marketing Guide
Optimized for Intel
Virtualization
Citrix XenClient extends the benefits of desktop virtualization to simplify the delivery and management of mobile client environments. People can work from anywhere, at any time—even offline—for exceptional flexibility and productivity. IT gains new levels of security, reliability and control as well as simplified desktop management.
Benefits When Used with Intel® vPro™ Technology
XenClient is optimized to run on Intel® Virtualization Technology
XenClient will be the first Type 1 hypervisor to support nested hypervisor acceleration with Intel® VMCS-Shadowing. With this, multiple hypervisors can be run on a single system, such as McAfee DeepSafe being nested with XenClient
Improved virtual machine performance with the Intel® Core™ vPro™ Platform
Citrix XenClient Enterprise
10/5/2015 53
SHOWCASES:
• Intel GVT
• VMCS Shadowing
Link:
Contact: Dena Lumbang
4th generation
XenClient
10/5/2015Intel Confidential • For Use Under NDA Only • Do Not Forward 54